With a popular plugin of over 6.8 million downloads, Yoast said there have been no public exploits since the exploit was exposed. The plugin monitors website traffic, providing site administrators with page view numbers and other trending data. Pynnonen explained in an advisory posted to the Full Disclosure mailing list that an attacker can store malicious JavaScript or HTML in the WordPress Administrator Dashboard and that code could be triggered by merely viewing the Yoast plugin settings panel. All of this can be accomplished without authentication. Read the full details here.